Merge branch 'vendor/OPENSSH'
[dragonfly.git] / contrib / hostapd / src / tls / tlsv1_record.c
1 /*
2  * TLSv1 Record Protocol
3  * Copyright (c) 2006-2011, Jouni Malinen <j@w1.fi>
4  *
5  * This software may be distributed under the terms of the BSD license.
6  * See README for more details.
7  */
8
9 #include "includes.h"
10
11 #include "common.h"
12 #include "crypto/md5.h"
13 #include "crypto/sha1.h"
14 #include "crypto/sha256.h"
15 #include "tlsv1_common.h"
16 #include "tlsv1_record.h"
17
18
19 /**
20  * tlsv1_record_set_cipher_suite - TLS record layer: Set cipher suite
21  * @rl: Pointer to TLS record layer data
22  * @cipher_suite: New cipher suite
23  * Returns: 0 on success, -1 on failure
24  *
25  * This function is used to prepare TLS record layer for cipher suite change.
26  * tlsv1_record_change_write_cipher() and
27  * tlsv1_record_change_read_cipher() functions can then be used to change the
28  * currently used ciphers.
29  */
30 int tlsv1_record_set_cipher_suite(struct tlsv1_record_layer *rl,
31                                   u16 cipher_suite)
32 {
33         const struct tls_cipher_suite *suite;
34         const struct tls_cipher_data *data;
35
36         wpa_printf(MSG_DEBUG, "TLSv1: Selected cipher suite: 0x%04x",
37                    cipher_suite);
38         rl->cipher_suite = cipher_suite;
39
40         suite = tls_get_cipher_suite(cipher_suite);
41         if (suite == NULL)
42                 return -1;
43
44         if (suite->hash == TLS_HASH_MD5) {
45                 rl->hash_alg = CRYPTO_HASH_ALG_HMAC_MD5;
46                 rl->hash_size = MD5_MAC_LEN;
47         } else if (suite->hash == TLS_HASH_SHA) {
48                 rl->hash_alg = CRYPTO_HASH_ALG_HMAC_SHA1;
49                 rl->hash_size = SHA1_MAC_LEN;
50         } else if (suite->hash == TLS_HASH_SHA256) {
51                 rl->hash_alg = CRYPTO_HASH_ALG_HMAC_SHA256;
52                 rl->hash_size = SHA256_MAC_LEN;
53         }
54
55         data = tls_get_cipher_data(suite->cipher);
56         if (data == NULL)
57                 return -1;
58
59         rl->key_material_len = data->key_material;
60         rl->iv_size = data->block_size;
61         rl->cipher_alg = data->alg;
62
63         return 0;
64 }
65
66
67 /**
68  * tlsv1_record_change_write_cipher - TLS record layer: Change write cipher
69  * @rl: Pointer to TLS record layer data
70  * Returns: 0 on success (cipher changed), -1 on failure
71  *
72  * This function changes TLS record layer to use the new cipher suite
73  * configured with tlsv1_record_set_cipher_suite() for writing.
74  */
75 int tlsv1_record_change_write_cipher(struct tlsv1_record_layer *rl)
76 {
77         wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - New write cipher suite "
78                    "0x%04x", rl->cipher_suite);
79         rl->write_cipher_suite = rl->cipher_suite;
80         os_memset(rl->write_seq_num, 0, TLS_SEQ_NUM_LEN);
81
82         if (rl->write_cbc) {
83                 crypto_cipher_deinit(rl->write_cbc);
84                 rl->write_cbc = NULL;
85         }
86         if (rl->cipher_alg != CRYPTO_CIPHER_NULL) {
87                 rl->write_cbc = crypto_cipher_init(rl->cipher_alg,
88                                                    rl->write_iv, rl->write_key,
89                                                    rl->key_material_len);
90                 if (rl->write_cbc == NULL) {
91                         wpa_printf(MSG_DEBUG, "TLSv1: Failed to initialize "
92                                    "cipher");
93                         return -1;
94                 }
95         }
96
97         return 0;
98 }
99
100
101 /**
102  * tlsv1_record_change_read_cipher - TLS record layer: Change read cipher
103  * @rl: Pointer to TLS record layer data
104  * Returns: 0 on success (cipher changed), -1 on failure
105  *
106  * This function changes TLS record layer to use the new cipher suite
107  * configured with tlsv1_record_set_cipher_suite() for reading.
108  */
109 int tlsv1_record_change_read_cipher(struct tlsv1_record_layer *rl)
110 {
111         wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - New read cipher suite "
112                    "0x%04x", rl->cipher_suite);
113         rl->read_cipher_suite = rl->cipher_suite;
114         os_memset(rl->read_seq_num, 0, TLS_SEQ_NUM_LEN);
115
116         if (rl->read_cbc) {
117                 crypto_cipher_deinit(rl->read_cbc);
118                 rl->read_cbc = NULL;
119         }
120         if (rl->cipher_alg != CRYPTO_CIPHER_NULL) {
121                 rl->read_cbc = crypto_cipher_init(rl->cipher_alg,
122                                                   rl->read_iv, rl->read_key,
123                                                   rl->key_material_len);
124                 if (rl->read_cbc == NULL) {
125                         wpa_printf(MSG_DEBUG, "TLSv1: Failed to initialize "
126                                    "cipher");
127                         return -1;
128                 }
129         }
130
131         return 0;
132 }
133
134
135 /**
136  * tlsv1_record_send - TLS record layer: Send a message
137  * @rl: Pointer to TLS record layer data
138  * @content_type: Content type (TLS_CONTENT_TYPE_*)
139  * @buf: Buffer for the generated TLS message (needs to have extra space for
140  * header, IV (TLS v1.1), and HMAC)
141  * @buf_size: Maximum buf size
142  * @payload: Payload to be sent
143  * @payload_len: Length of the payload
144  * @out_len: Buffer for returning the used buf length
145  * Returns: 0 on success, -1 on failure
146  *
147  * This function fills in the TLS record layer header, adds HMAC, and encrypts
148  * the data using the current write cipher.
149  */
150 int tlsv1_record_send(struct tlsv1_record_layer *rl, u8 content_type, u8 *buf,
151                       size_t buf_size, const u8 *payload, size_t payload_len,
152                       size_t *out_len)
153 {
154         u8 *pos, *ct_start, *length, *cpayload;
155         struct crypto_hash *hmac;
156         size_t clen;
157         int explicit_iv;
158
159         pos = buf;
160         if (pos + TLS_RECORD_HEADER_LEN > buf + buf_size)
161                 return -1;
162
163         /* ContentType type */
164         ct_start = pos;
165         *pos++ = content_type;
166         /* ProtocolVersion version */
167         WPA_PUT_BE16(pos, rl->tls_version);
168         pos += 2;
169         /* uint16 length */
170         length = pos;
171         WPA_PUT_BE16(length, payload_len);
172         pos += 2;
173
174         cpayload = pos;
175         explicit_iv = rl->write_cipher_suite != TLS_NULL_WITH_NULL_NULL &&
176                 rl->iv_size && rl->tls_version >= TLS_VERSION_1_1;
177         if (explicit_iv) {
178                 /* opaque IV[Cipherspec.block_length] */
179                 if (pos + rl->iv_size > buf + buf_size)
180                         return -1;
181
182                 /*
183                  * Use random number R per the RFC 4346, 6.2.3.2 CBC Block
184                  * Cipher option 2a.
185                  */
186
187                 if (os_get_random(pos, rl->iv_size))
188                         return -1;
189                 pos += rl->iv_size;
190         }
191
192         /*
193          * opaque fragment[TLSPlaintext.length]
194          * (opaque content[TLSCompressed.length] in GenericBlockCipher)
195          */
196         if (pos + payload_len > buf + buf_size)
197                 return -1;
198         os_memmove(pos, payload, payload_len);
199         pos += payload_len;
200
201         if (rl->write_cipher_suite != TLS_NULL_WITH_NULL_NULL) {
202                 /*
203                  * MAC calculated over seq_num + TLSCompressed.type +
204                  * TLSCompressed.version + TLSCompressed.length +
205                  * TLSCompressed.fragment
206                  */
207                 hmac = crypto_hash_init(rl->hash_alg, rl->write_mac_secret,
208                                         rl->hash_size);
209                 if (hmac == NULL) {
210                         wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Failed "
211                                    "to initialize HMAC");
212                         return -1;
213                 }
214                 crypto_hash_update(hmac, rl->write_seq_num, TLS_SEQ_NUM_LEN);
215                 /* type + version + length + fragment */
216                 crypto_hash_update(hmac, ct_start, TLS_RECORD_HEADER_LEN);
217                 crypto_hash_update(hmac, payload, payload_len);
218                 clen = buf + buf_size - pos;
219                 if (clen < rl->hash_size) {
220                         wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Not "
221                                    "enough room for MAC");
222                         crypto_hash_finish(hmac, NULL, NULL);
223                         return -1;
224                 }
225
226                 if (crypto_hash_finish(hmac, pos, &clen) < 0) {
227                         wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Failed "
228                                    "to calculate HMAC");
229                         return -1;
230                 }
231                 wpa_hexdump(MSG_MSGDUMP, "TLSv1: Record Layer - Write HMAC",
232                             pos, clen);
233                 pos += clen;
234                 if (rl->iv_size) {
235                         size_t len = pos - cpayload;
236                         size_t pad;
237                         pad = (len + 1) % rl->iv_size;
238                         if (pad)
239                                 pad = rl->iv_size - pad;
240                         if (pos + pad + 1 > buf + buf_size) {
241                                 wpa_printf(MSG_DEBUG, "TLSv1: No room for "
242                                            "block cipher padding");
243                                 return -1;
244                         }
245                         os_memset(pos, pad, pad + 1);
246                         pos += pad + 1;
247                 }
248
249                 if (crypto_cipher_encrypt(rl->write_cbc, cpayload,
250                                           cpayload, pos - cpayload) < 0)
251                         return -1;
252         }
253
254         WPA_PUT_BE16(length, pos - length - 2);
255         inc_byte_array(rl->write_seq_num, TLS_SEQ_NUM_LEN);
256
257         *out_len = pos - buf;
258
259         return 0;
260 }
261
262
263 /**
264  * tlsv1_record_receive - TLS record layer: Process a received message
265  * @rl: Pointer to TLS record layer data
266  * @in_data: Received data
267  * @in_len: Length of the received data
268  * @out_data: Buffer for output data (must be at least as long as in_data)
269  * @out_len: Set to maximum out_data length by caller; used to return the
270  * length of the used data
271  * @alert: Buffer for returning an alert value on failure
272  * Returns: Number of bytes used from in_data on success, 0 if record was not
273  *      complete (more data needed), or -1 on failure
274  *
275  * This function decrypts the received message, verifies HMAC and TLS record
276  * layer header.
277  */
278 int tlsv1_record_receive(struct tlsv1_record_layer *rl,
279                          const u8 *in_data, size_t in_len,
280                          u8 *out_data, size_t *out_len, u8 *alert)
281 {
282         size_t i, rlen, hlen;
283         u8 padlen;
284         struct crypto_hash *hmac;
285         u8 len[2], hash[100];
286         int force_mac_error = 0;
287         u8 ct;
288
289         if (in_len < TLS_RECORD_HEADER_LEN) {
290                 wpa_printf(MSG_DEBUG, "TLSv1: Too short record (in_len=%lu) - "
291                            "need more data",
292                            (unsigned long) in_len);
293                 wpa_hexdump(MSG_MSGDUMP, "TLSv1: Record Layer - Received",
294                             in_data, in_len);
295                 return 0;
296         }
297
298         ct = in_data[0];
299         rlen = WPA_GET_BE16(in_data + 3);
300         wpa_printf(MSG_DEBUG, "TLSv1: Received content type %d version %d.%d "
301                    "length %d", ct, in_data[1], in_data[2], (int) rlen);
302
303         /*
304          * TLS v1.0 and v1.1 RFCs were not exactly clear on the use of the
305          * protocol version in record layer. As such, accept any {03,xx} value
306          * to remain compatible with existing implementations.
307          */
308         if (in_data[1] != 0x03) {
309                 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected protocol version "
310                            "%u.%u", in_data[1], in_data[2]);
311                 *alert = TLS_ALERT_PROTOCOL_VERSION;
312                 return -1;
313         }
314
315         /* TLSCiphertext must not be more than 2^14+2048 bytes */
316         if (TLS_RECORD_HEADER_LEN + rlen > 18432) {
317                 wpa_printf(MSG_DEBUG, "TLSv1: Record overflow (len=%lu)",
318                            (unsigned long) (TLS_RECORD_HEADER_LEN + rlen));
319                 *alert = TLS_ALERT_RECORD_OVERFLOW;
320                 return -1;
321         }
322
323         in_data += TLS_RECORD_HEADER_LEN;
324         in_len -= TLS_RECORD_HEADER_LEN;
325
326         if (rlen > in_len) {
327                 wpa_printf(MSG_DEBUG, "TLSv1: Not all record data included "
328                            "(rlen=%lu > in_len=%lu)",
329                            (unsigned long) rlen, (unsigned long) in_len);
330                 return 0;
331         }
332
333         wpa_hexdump(MSG_MSGDUMP, "TLSv1: Record Layer - Received",
334                     in_data, rlen);
335
336         if (ct != TLS_CONTENT_TYPE_HANDSHAKE &&
337             ct != TLS_CONTENT_TYPE_CHANGE_CIPHER_SPEC &&
338             ct != TLS_CONTENT_TYPE_ALERT &&
339             ct != TLS_CONTENT_TYPE_APPLICATION_DATA) {
340                 wpa_printf(MSG_DEBUG, "TLSv1: Ignore record with unknown "
341                            "content type 0x%x", ct);
342                 *alert = TLS_ALERT_UNEXPECTED_MESSAGE;
343                 return -1;
344         }
345
346         in_len = rlen;
347
348         if (*out_len < in_len) {
349                 wpa_printf(MSG_DEBUG, "TLSv1: Not enough output buffer for "
350                            "processing received record");
351                 *alert = TLS_ALERT_INTERNAL_ERROR;
352                 return -1;
353         }
354
355         if (rl->read_cipher_suite != TLS_NULL_WITH_NULL_NULL) {
356                 size_t plen;
357                 if (crypto_cipher_decrypt(rl->read_cbc, in_data,
358                                           out_data, in_len) < 0) {
359                         *alert = TLS_ALERT_DECRYPTION_FAILED;
360                         return -1;
361                 }
362                 plen = in_len;
363                 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: Record Layer - Decrypted "
364                                 "data", out_data, plen);
365
366                 if (rl->iv_size) {
367                         /*
368                          * TLS v1.0 defines different alert values for various
369                          * failures. That may information to aid in attacks, so
370                          * use the same bad_record_mac alert regardless of the
371                          * issues.
372                          *
373                          * In addition, instead of returning immediately on
374                          * error, run through the MAC check to make timing
375                          * attacks more difficult.
376                          */
377
378                         if (rl->tls_version >= TLS_VERSION_1_1) {
379                                 /* Remove opaque IV[Cipherspec.block_length] */
380                                 if (plen < rl->iv_size) {
381                                         wpa_printf(MSG_DEBUG, "TLSv1.1: Not "
382                                                    "enough room for IV");
383                                         force_mac_error = 1;
384                                         goto check_mac;
385                                 }
386                                 os_memmove(out_data, out_data + rl->iv_size,
387                                            plen - rl->iv_size);
388                                 plen -= rl->iv_size;
389                         }
390
391                         /* Verify and remove padding */
392                         if (plen == 0) {
393                                 wpa_printf(MSG_DEBUG, "TLSv1: Too short record"
394                                            " (no pad)");
395                                 force_mac_error = 1;
396                                 goto check_mac;
397                         }
398                         padlen = out_data[plen - 1];
399                         if (padlen >= plen) {
400                                 wpa_printf(MSG_DEBUG, "TLSv1: Incorrect pad "
401                                            "length (%u, plen=%lu) in "
402                                            "received record",
403                                            padlen, (unsigned long) plen);
404                                 force_mac_error = 1;
405                                 goto check_mac;
406                         }
407                         for (i = plen - padlen - 1; i < plen - 1; i++) {
408                                 if (out_data[i] != padlen) {
409                                         wpa_hexdump(MSG_DEBUG,
410                                                     "TLSv1: Invalid pad in "
411                                                     "received record",
412                                                     out_data + plen - padlen -
413                                                     1, padlen + 1);
414                                         force_mac_error = 1;
415                                         goto check_mac;
416                                 }
417                         }
418
419                         plen -= padlen + 1;
420
421                         wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: Record Layer - "
422                                         "Decrypted data with IV and padding "
423                                         "removed", out_data, plen);
424                 }
425
426         check_mac:
427                 if (plen < rl->hash_size) {
428                         wpa_printf(MSG_DEBUG, "TLSv1: Too short record; no "
429                                    "hash value");
430                         *alert = TLS_ALERT_BAD_RECORD_MAC;
431                         return -1;
432                 }
433
434                 plen -= rl->hash_size;
435
436                 hmac = crypto_hash_init(rl->hash_alg, rl->read_mac_secret,
437                                         rl->hash_size);
438                 if (hmac == NULL) {
439                         wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Failed "
440                                    "to initialize HMAC");
441                         *alert = TLS_ALERT_INTERNAL_ERROR;
442                         return -1;
443                 }
444
445                 crypto_hash_update(hmac, rl->read_seq_num, TLS_SEQ_NUM_LEN);
446                 /* type + version + length + fragment */
447                 crypto_hash_update(hmac, in_data - TLS_RECORD_HEADER_LEN, 3);
448                 WPA_PUT_BE16(len, plen);
449                 crypto_hash_update(hmac, len, 2);
450                 crypto_hash_update(hmac, out_data, plen);
451                 hlen = sizeof(hash);
452                 if (crypto_hash_finish(hmac, hash, &hlen) < 0) {
453                         wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Failed "
454                                    "to calculate HMAC");
455                         *alert = TLS_ALERT_INTERNAL_ERROR;
456                         return -1;
457                 }
458                 if (hlen != rl->hash_size ||
459                     os_memcmp(hash, out_data + plen, hlen) != 0 ||
460                     force_mac_error) {
461                         wpa_printf(MSG_DEBUG, "TLSv1: Invalid HMAC value in "
462                                    "received message (force_mac_error=%d)",
463                                    force_mac_error);
464                         *alert = TLS_ALERT_BAD_RECORD_MAC;
465                         return -1;
466                 }
467
468                 *out_len = plen;
469         } else {
470                 os_memcpy(out_data, in_data, in_len);
471                 *out_len = in_len;
472         }
473
474         /* TLSCompressed must not be more than 2^14+1024 bytes */
475         if (TLS_RECORD_HEADER_LEN + *out_len > 17408) {
476                 wpa_printf(MSG_DEBUG, "TLSv1: Record overflow (len=%lu)",
477                            (unsigned long) (TLS_RECORD_HEADER_LEN + *out_len));
478                 *alert = TLS_ALERT_RECORD_OVERFLOW;
479                 return -1;
480         }
481
482         inc_byte_array(rl->read_seq_num, TLS_SEQ_NUM_LEN);
483
484         return TLS_RECORD_HEADER_LEN + rlen;
485 }